Cybersecurity Lesson 4

Edit Answers
WJNRYCMHQTEHZDUBZLYE RHFSSUZUXRPDYIADMNXG NYTIRUCESREBYCHOEGMC WGNITXETERPVKTAE-ZAH QDROWSSAPZHUPICIXYLJ HC-BAITINGPVHOKBWWWC CQKDLHLJMCLFANESKVAG RIYLRALJTVAQRARUSERE ZOXEBRIGGCICMRWRDLER TTAMPUICRETBIYTIZBVA WTUFRPGEOWNQNOQVUASW OFTZEHRQSSEIG-VDCLFM -AJNV-Q-ZODACJXRYIOO FISPYWAREDIGDMLKCAAS ATGMTKNLLZFNZWQLCVLN CICMETIHWZNGAEAQ-ADA TANTIVIRUSORTJWR-KLR OTJPUZWLFWCZJZOOETKB RDFNPHISHINGPULRRNCX HCKDXYBINTEGRITYTM-T
1.
adware
2.
software
3.
available
4.
backup
5.
baiting
6.
hat hacker
7.
Triad
8.
confidential
9.
cybersecurity
10.
attack
11.
hacker
12.
integrity
13.
malware
14.
manager
15.
pharming
16.
phishing
17.
pretexting
18.
ransomware
19.
engineering
20.
spyware
21.
threat
22.
trojan
23.
authentication
24.
virus
25.
hat hacker
26.
worm